Author:
Camenisch Jan,Enderlein Robert R.,Neven Gregory
Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Bagherzandi, A., Jarecki, S., Saxena, N., Lu, Y.: Password-protected secret sharing. In: ACM CCS 2011, pp. 433–444 (2011)
2. Lecture Notes in Computer Science;B Barak,2005
3. Lecture Notes in Computer Science;D Beaver,1993
4. Brainard, J., Juels, A., Kaliski, B., Szydlo, M.: A new two-server approach for authentication with short secrets. In: USENIX SECURITY 2003, pp. 201–214 (2003)
5. Burr, W., Dodson, D., Newton, E., Perlner, R., Polk, W., Gupta, S., Nabbus, E.: Electronic authentication guideline. NIST Special Publication 800–63-1 (2011)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage;IEEE Transactions on Services Computing;2023
2. Password-authenticated searchable encryption;International Journal of Information Security;2020-11-22
3. The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services;Sensors;2020-02-10
4. Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers;Proceedings of the 13th International Conference on Availability, Reliability and Security;2018-08-27
5. PASTA;Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security;2018-01-15